SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   AOLserver Vendors:   America Online, Inc.
AOLserver for Windows Discloses Password-Protected Files to Remote Users
SecurityTracker Alert ID:  1003129
SecurityTracker URL:  http://securitytracker.com/id/1003129
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jan 6 2002
Impact:   Disclosure of user information
Exploit Included:  Yes  
Version(s): 3.4.2
Description:   SecurityOffice.net reported an information disclosure vulnerability in the AOLserver Windows version. A remote user can obtain password-protected files from the web server.

It is reported that a remote user can gain read access of known password-protected files residing on the web server using the following type of URL:

http://host/passwordprotected.file.

It is reported that the Unix versions are not affected.

Impact:   A remote user can view known password-protected files on the web server.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.aolserver.com/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (NT), Windows (2000), Windows (XP)
Underlying OS Comments:  Tested on Windows 2000

Message History:   None.


 Source Message Contents

Subject:  [VulnWatch] AOLserver 3.4.2 Unauthorized File Disclosure Vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

AOLserver 3.4.2 Unauthorized File Disclosure Vulnerability

Type:
File Disclosure

Release Date:
January 6, 2002

Product / Vendor:
AOLserver is America Online's Open-Source web server. AOLserver is
the backbone of the largest and busiest production environments in
the world. AOLserver is a multithreaded, Tcl-enabled web server used
for large scale, dynamic web sites.

http://www.aolserver.com

Summary:
Due to a flaw in AOLserver 3.4.2 for Windows, it is possible for a
user to gain read access of known password protected files residing
on a AOLserver host.

http://host/passwordprotected.file.

Example:
http://host/nstelemetry.adp.

Tested:
Windows 2000 / AOLserver 3.4.2

Vulnerable:
AOLserver 3.4.2 for Windows
(Unix versions not affect this vulnerability)

Disclaimer:
http://www.securityoffice.net is not responsible for the misuse or
illegal use of any of the information and/or the software listed on
this security advisory.

Author:
Tamer Sahin
ts@securityoffice.net
http://www.securityoffice.net

Tamer Sahin
http://www.securityoffice.net
PGP Key ID: 0x2B5EDCB0 Fingerprint:
B96A 5DFC E0D9 D615 8D28 7A1B BB8B A453 2B5E DCB0

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBPDfjqbuLpFMrXtywEQK3yACg54P+AUsgY2eGAIa2xharaPuJr/oAnimD
+BJ2YUdAu8f3hDhfoj3rLMcw
=pLhO
-----END PGP SIGNATURE-----






 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC